Cyberwarfare (Record no. 174631)

MARC details
000 -LEADER
fixed length control field 05006nam a22006255i 4500
001 - CONTROL NUMBER
control field 978-3-030-97299-8
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423125132.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 221118s2022 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030972998
-- 978-3-030-97299-8
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-030-97299-8
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6772-6773.3
072 #7 - SUBJECT CATEGORY CODE
Subject category code JKV
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code SOC004000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code LNQE
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364.168
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stoddart, Kristan.
Relator term author.
Relator code aut
-- http://id.loc.gov/vocabulary/relators/aut
245 10 - TITLE STATEMENT
Title Cyberwarfare
Medium [electronic resource] :
Remainder of title Threats to Critical Infrastructure /
Statement of responsibility, etc by Kristan Stoddart.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2022.
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Palgrave Macmillan,
-- 2022.
300 ## - PHYSICAL DESCRIPTION
Extent XXXV, 521 p. 6 illus., 5 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Palgrave Studies in Cybercrime and Cybersecurity,
International Standard Serial Number 2946-2789
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- Chapter 1: On Cyberwar: Theorizing cyberwarfare through attacks on critical infrastructure – Reality, potential and debates -- Chapter 2: Cyberwar: Attacking Critical Infrastructure -- Chapter 3: Gaining Access: Attack and defense methods and legacy systems -- Chapter 4 – Hacking the human -- Chapter 5: Non and sub-state actors: Cybercrime, terrorism and hackers -- Conclusion. .
520 ## - SUMMARY, ETC.
Summary, etc “Kristan Stoddart brings together an outstanding treatise of one of the most important subjects in international security of our times… This book offers innovative insights for scholars interested in the security and strategy of cyberwarfare, as well as those interested in understanding the security dynamics of the modern world more generally.” -Christian Kaunert, Professor of International Security, Dublin City University & University of South Wales. “This book provides an exciting level of insight and detail into one of the most obscure and less explored areas of cyberspace studies. It is very informative and extremely interesting to read and I am certain it will be a necessary resource for students and academics in the field of cyber-related studies, international politics and beyond.” — Vasileios Karagiannopoulos, Reader in Cybercrime and Cybersecurity and Director of the Cybercrime Awareness Clinic, University of Portsmouth, UK. This book provides a detailed examination of the threats and dangers facing the West at the far end of the cybersecurity spectrum. It concentrates on threats to critical infrastructure which includes major public utilities. It focusses on the threats posed by the two most potent adversaries/competitors to the West, Russia and China, whilst considering threats posed by Iran and North Korea. The arguments and themes are empirically driven but are also driven by the need to evolve the nascent debate on cyberwarfare and conceptions of ‘cyberwar’. This book seeks to progress both conceptions and define them more tightly. This accessibly written book speaks to those interested in cybersecurity, international relations and international security, law, criminology, psychology as well as to the technical cybersecurity community, those in industry, governments, policing, law making and law enforcement, and in militaries (particularly NATO members). Kristan Stoddart is Associate Professor in Cyber Threats in the School of Social Sciences at Swansea University, UK, a member of Swansea’s Cyber Threats Research Centre (CYTREC), and Visiting Professor at the University of South Wales. He currently holds a grant looking at EU resilience Against Hybrid Warfare. From 2014-17, he worked on a £1.2 million project which analyzed SCADA systems and the Cyber Security Lifecycle co-funded by Airbus Group and the Welsh government from which this book draws.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Criminology.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Security, International.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Terrorism.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Political violence.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Peace.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cybercrime.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Crime Control and Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element International Security Studies.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Terrorism and Political Violence.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Peace and Conflict Studies.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783030972981
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783030973001
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783030973018
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Palgrave Studies in Cybercrime and Cybersecurity,
-- 2946-2789
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-030-97299-8">https://doi.org/10.1007/978-3-030-97299-8</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in